Keep Business Communication Confidential

Protecting Students’ Information: Universities and Secure Communications

From financial aid information to social security numbers, students regularly share private information with their universities trusting that the university will keep it safe. That’s why it was disappointing when three major universities this summer disclosed that students’ information had been compromised. Private information including social security numbers, addresses and ... Read More

Do VPNs Actually Protect Your Privacy?

With privacy a growing concern, it makes sense that an increasing number of people are turning to VPNs to protect themselves. VPNs are known for protecting users’ privacy by encrypting their computer traffic and routing the encrypted traffic through anonymous routers, hiding the user’s identity. Thirty percent of all internet ... Read More
Keep Business Communication Confidential

Cybersecurity is About Teamwork, Not Individuals

More and more, businesses blame cyberattacks on “human error,” that single employee who, either accidentally or maliciously, made a decision that resulted in a security breach. You probably remember the 2017 Equifax breach that exposed over 145 million Americans’ personal information. At the time, the ex-CEO blamed a single employee ... Read More
Incident Response

Your Network Has Been Compromised. What Now?

Security experts agree: breaches are inevitable today, which is why it’s all the more important to have an incident response plan in place. Resolving the incident when you’re still able to communicate over your main network is hard enough but what happens when you get hit by a breach that ... Read More
Incident Response

Phishing Just Got More Complicated

Last month, the FBI released a note warning businessesthat hackers are bypassing two-factor authentication. Two-factor authentication is usually seen as extra secure because it not only requires your username and passcode but also a unique security token—like a one-time password texted to your smartphone. Businesses are increasingly usingtwo-factor authentication as ... Read More